Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
10 - Compromising Step 7 Software on Windows Field PGs.mp4 |
13.49MB |
10 - Compromising Step 7 Software on Windows Field PGs English.vtt |
2.86KB |
11 - Altering Centrifuge Operations.mp4 |
4.61MB |
11 - Altering Centrifuge Operations English.vtt |
994B |
12 - Stuxnet Command and Control.mp4 |
4.81MB |
12 - Stuxnet Command and Control English.vtt |
948B |
13 - Updating Stuxnet through RPC.mp4 |
11.28MB |
13 - Updating Stuxnet through RPC English.vtt |
2.65KB |
14 - Detection of Stuxnet.mp4 |
20.86MB |
14 - Detection of Stuxnet English.vtt |
3.01KB |
15 - Stuxnet Spin Offs.mp4 |
13.05MB |
15 - Stuxnet Spin Offs English.vtt |
3.33KB |
16 - Final Thoughts on Stuxnet.mp4 |
5.58MB |
16 - Final Thoughts on Stuxnet English.vtt |
1.25KB |
17 - What is a Ransomware.mp4 |
28.59MB |
17 - What is a Ransomware English.vtt |
3.73KB |
18 - Evolution of Ransomware.mp4 |
27.20MB |
18 - Evolution of Ransomware English.vtt |
8.58KB |
19 - Modern Ransomware Impact.mp4 |
10.36MB |
19 - Modern Ransomware Impact English.vtt |
2.75KB |
1 - Introduction.mp4 |
33.89MB |
1 - Introduction English.vtt |
6.85KB |
1 - Test Your Knowledge on Stuxnet the Infamous Cyberweapon.html |
309B |
20 - Introduction to WannaCry Ransomware.mp4 |
21.16MB |
20 - Introduction to WannaCry Ransomware English.vtt |
3.26KB |
21 - WannaCry Components.mp4 |
10.27MB |
21 - WannaCry Components English.vtt |
1.94KB |
22 - The Kill Switch.mp4 |
8.37MB |
22 - The Kill Switch English.vtt |
2.41KB |
23 - Starting the Windows Service.mp4 |
6.94MB |
23 - Starting the Windows Service English.vtt |
1.87KB |
24 - Unload Resources used in the Attack.mp4 |
19.11MB |
24 - Unload Resources used in the Attack English.vtt |
3.67KB |
25 - Decrypting the Encrypted DLL Component.mp4 |
10.75MB |
25 - Decrypting the Encrypted DLL Component English.vtt |
2.43KB |
26 - Key Generation and Encryption of User Files.mp4 |
20.84MB |
26 - Key Generation and Encryption of User Files English.vtt |
3.93KB |
27 - What does WannaCry Encrypt.mp4 |
12.94MB |
27 - What does WannaCry Encrypt English.vtt |
1.68KB |
28 - Additional Processes in the Attack.mp4 |
13.20MB |
28 - Additional Processes in the Attack English.vtt |
2.09KB |
29 - Increasing Impact and Preventing Recovery.mp4 |
10.54MB |
29 - Increasing Impact and Preventing Recovery English.vtt |
1.31KB |
2 - How to Get Most Out of Course.mp4 |
1.52MB |
2 - How to Get Most Out of Course English.vtt |
806B |
2 - The WannaCry Ransomware Quiz.html |
587B |
30 - Unveiling Command and Control Communication.mp4 |
21.50MB |
30 - Unveiling Command and Control Communication English.vtt |
2.84KB |
31 - How much money did attackers collect.mp4 |
22.29MB |
31 - How much money did attackers collect English.vtt |
2.38KB |
32 - Why is the data not Recoverable.mp4 |
11.71MB |
32 - Why is the data not Recoverable English.vtt |
2.34KB |
33 - The Worm Component Propagation of WannaCry.mp4 |
13.54MB |
33 - The Worm Component Propagation of WannaCry English.vtt |
2.60KB |
34 - Preventing WannaCry Safeguarding Your Systems.mp4 |
14.75MB |
34 - Preventing WannaCry Safeguarding Your Systems English.vtt |
3.02KB |
35 - Final Thoughts on WannaCry.mp4 |
5.73MB |
35 - Final Thoughts on WannaCry English.vtt |
692B |
36 - What is Spyware.mp4 |
45.68MB |
36 - What is Spyware English.vtt |
6.81KB |
37 - Introduction to Pegasus Spyware.mp4 |
29.55MB |
37 - Introduction to Pegasus Spyware English.vtt |
4.91KB |
38 - Pegasus Device Infection.mp4 |
8.99MB |
38 - Pegasus Device Infection English.vtt |
3.46KB |
39 - Device Exploit Trident Vulnerability.mp4 |
20.43MB |
39 - Device Exploit Trident Vulnerability English.vtt |
5.51KB |
3 - Pegasus Quiz.html |
300B |
3 - Stuxnet Worlds First Malware Targeting Physical Infrastructure.mp4 |
11.44MB |
3 - Stuxnet Worlds First Malware Targeting Physical Infrastructure English.vtt |
2.98KB |
40 - Agent Installation and Persistence.mp4 |
12.23MB |
40 - Agent Installation and Persistence English.vtt |
2.40KB |
41 - User Device and Surveillance.mp4 |
19.65MB |
41 - User Device and Surveillance English.vtt |
3.76KB |
42 - Data Exfiltration to Command and Control.mp4 |
13.00MB |
42 - Data Exfiltration to Command and Control English.vtt |
2.20KB |
43 - Pegasus Abuse.mp4 |
20.87MB |
43 - Pegasus Abuse English.vtt |
1.88KB |
44 - Final Thoughts on Pegasus.mp4 |
9.49MB |
44 - Final Thoughts on Pegasus English.vtt |
1.67KB |
45 - Course Summary.mp4 |
9.67MB |
45 - Course Summary English.vtt |
2.13KB |
4 - Motivation behind Stuxnet.mp4 |
18.56MB |
4 - Motivation behind Stuxnet English.vtt |
2.14KB |
5 - Normal Operations at the Nuclear Plant.mp4 |
8.78MB |
5 - Normal Operations at the Nuclear Plant English.vtt |
2.92KB |
6 - Stuxnet Attack Overview.mp4 |
8.03MB |
6 - Stuxnet Attack Overview English.vtt |
2.27KB |
7 - Entering the Facility by Compromising Initial Systems.mp4 |
20.00MB |
7 - Entering the Facility by Compromising Initial Systems English.vtt |
4.39KB |
8 - Finding Field PGs with Network Propagation Techniques.mp4 |
17.45MB |
8 - Finding Field PGs with Network Propagation Techniques English.vtt |
3.36KB |
9 - Spreading through Infected USB Drives.mp4 |
18.24MB |
9 - Spreading through Infected USB Drives English.vtt |
3.19KB |
Bonus Resources.txt |
386B |
Get Bonus Downloads Here.url |
182B |